The person who found the problem has published a small test script on his website that determine if your ISP is vulnerable.

Curiously, the OpenBSD team haven't said a word about it.. nor have they done a patch, odd.

Actually you are VERY WRONG. There was a long discussion on misc@open
about vulnerability found in BIND last week and I would do a disservice to OpenBSD project if I try to repeat it or give a summery here.

You are welcome to go through archive and see what lead developers had to say about it. OpenBSD would not be OpenBSD if they were relaying on some hasty patches to fix the problem. Problem is most likely not isolated and represents whole class of new bugs.

If you can not wait for proper fix you should switch from BIND to djbdns as
it seems for now that djbdns is bullet proof.

If you can not wait for proper fix you should switch from BIND to djbdns as
it seems for now that djbdns is bullet proof.

That may be, but djbdns is unmaintained since 2001, Bernstein is a great guy, but it just sucks how he releases software, you'll have to search the net in search of patches, often encountering dead links QMail is even worse...

__________________
UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things.

That may be, but djbdns is unmaintained since 2001, Bernstein is a great guy, but it just sucks how he releases software, you'll have to search the net in search of patches, often encountering dead links QMail is even worse...

We had a discussion about Bernstein's software as well in the past couple of weeks on misc@open.

Again you could inform yourself by reading archives. I agree about QMail and your post in general. Actually due to lack of licenses his software was removed from the OpenBSD ports three many years ago. Now when his software is released into public domain it is ported again (so you do not have to seek any patches and do anything manually) but the ports are not committed to the port three. So I can send you zip files or look ports@open to find them.